Manage authentication methods in Amazon SDKs
Users in Amazon Cognito user pools can sign in with a variety of initial sign-in options, or factors. For some factors, users can follow up with multi-factor authentication (MFA). These first factors include username and password, one-time password, passkey, and custom authentication. For more information, see Authentication flows. When your application has built-in UI components and imports an Amazon SDK module, you must build application logic for authentication. You must choose one of two primary methods and from that method, the authentication mechanisms that you want to implement.
You can implement client-based authentication where your application, or client, declares the type of authentication up front. Your other option is choice-based authentication, where your app collects a username and requests the available authentication types for users. You can implement these models together in the same application or split between app clients, according to your requirements. Each method has features that are unique to it, for example custom authentication in client-based and passwordless authentication in choice-based.
In custom-built applications that perform authentication with Amazon SDK implementation of
the users pools API, you must structure your API requests to align with user pool
configuration, app client configuration, and client-side preferences. An
InitiateAuth session that begins with an AuthFlow of
USER_AUTH begins choice-based authentication. Amazon Cognito responds to your API with a
challenge of either a preferred authentication method or a list of choices. A session that
begins with AuthFlow of CUSTOM_AUTH goes right into custom
authentication with Lambda triggers.
Some authentication methods are fixed to one of the two flow types, and some methods are available in both.
Choice-based authentication
Your application can request the following authentication methods in choice-based
authentication. Declare these options in the PREFERRED_CHALLENGE parameter of
InitiateAuth or AdminInitiateAuth, or in the ChallengeName parameter of RespondToAuthChallenge or AdminRespondToAuthChallenge.
To review these options in their API context, see ChallengeName in RespondToAuthChallenge.
Choice-based sign-in issues a challenge in response to your initial request. This challenge either verifies that a requested option is available, or provides a list of available choices. Your application can display these choices to users, who then enter credentials for their preferred sign-in method and proceed with authentication in challenge responses.
You have the following choice-based options in your authentication flow. All requests of this type require that your app first collect a username or retrieve it from a cache.
-
Request options with
AuthParametersofUSERNAMEonly. Amazon Cognito returns aSELECT_CHALLENGEchallenge. From there, your application can prompt the user to select a challenge and return this response to your user pool. -
Request a preferred challenge with
AuthParametersofPREFERRED_CHALLENGEand the parameters of your preferred challenge, if any. For example, if you request aPREFERRED_CHALLENGEofPASSWORD_SRP, you must also includeSRP_A. If your user, user pool, and app client are all configured for the preferred challenge, Amazon Cognito responds with the next step in that challenge, for examplePASSWORD_VERIFIERin thePASSWORD_SRPflow or CodeDeliveryDetails in theEMAIL_OTPandSMS_OTPflows. If the preferred challenge isn't available, Amazon Cognito responds withSELECT_CHALLENGEand a list of available challenges. -
Sign users in first, then request their choice-based authentication options. A GetUserAuthFactors request with the access token of a signed-in user returns their available choice-based authentication factors and their MFA settings. With this option, a user can sign in with username and password first, then activate a different form of authentication. You can also use this operation to check additional options for a user who has signed in with a preferred challenge.
To configure your app client for
choice-based authentication, add ALLOW_USER_AUTH to the allowed authentication
flows. You must also choose the choice-based factors that you want to permit in your user
pool configuration. The following process illustrates how to choose choice-based
authentication factors.
Client-based authentication
Client-based authentication supports the following authentication flows. Declare these
options in the AuthFlow parameter of InitiateAuth or AdminInitiateAuth.
-
USER_PASSWORD_AUTHandADMIN_USER_PASSWORD_AUTHSign-in with persistent passwords
This authentication flow is equivalent to
PASSWORDin choice-based authentication. -
USER_SRP_AUTHSign-in with persistent passwords and secure payload
This authentication flow is equivalent to
PASSWORD_SRPin choice-based authentication. -
REFRESH_TOKEN_AUTHThis authentication flow is only available in client-based authentication.
-
CUSTOM_AUTHThis authentication flow is only available in client-based authentication.
With client-based authentication, Amazon Cognito assumes that you have determined how your user
wants to authenticate before they begin authentication flows. The logic of determining the
sign-in factor that a user wants to provide must be determined with default settings or
custom prompts, then declared in the first request to your user pool. The
InitiateAuth request declares a sign-in AuthFlow that directly
corresponds to one of the listed options, for example USER_SRP_AUTH. With this
declaration, the request also includes the parameters to begin authentication, for example
USERNAME, SECRET_HASH, and SRP_A. Amazon Cognito might
follow up this request with additional challenges like PASSWORD_VERIFIER for
SRP or SOFTWARE_TOKEN_MFA for password sign-in with TOTP MFA.
To configure your app client for
client-based authentication, add any authentication flows other than
ALLOW_USER_AUTH to the allowed authentication flows. Examples are
ALLOW_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH,
ALLOW_REFRESH_TOKEN_AUTH. To permit client-based authentication flows, no
additional user pool configuration is required.